CVE-2025-47729: The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is...

1.9 CVSS

Description

The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.

Known Exploited

🚨 Marked as known exploited on May 8th, 2025 (27 days ago).

Classification

CVE ID: CVE-2025-47729

CVSS Base Severity: LOW

CVSS Base Score: 1.9

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

Problem Types

CWE-912 Hidden Functionality

Affected Products

Vendor: TeleMessage

Product: archiving backend

Exploit Prediction Scoring System (EPSS)

EPSS Score: 8.55% (probability of being exploited)

EPSS Percentile: 91.95% (scored less or equal to compared to others)

EPSS Date: 2025-06-03 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-47729
https://news.ycombinator.com/item?id=43909220
https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stops-operations-after-report-it-was-hacked/
https://www.theregister.com/2025/05/05/telemessage_investigating/

Timeline